A PRACTICAL APPROACH TO MALWARE MEMORY FORENSICS WITH EFORENSICS OPEN

Download
File
eForensics_Open_02_2013.pdf
eForensics_Open_02_2013.epub

Check what you can find inside:

DIGITAL FORENSICS 101: Case Study Using FTK Imager by Dauda Sule

It is quite remarkable how digital evidence can be used to solve crimes, even if not committed directly using digital devices and platforms. This article tries to give a basic introduction to digital forensics. It focuses on how to retrieve data, covering basic steps on collection digital evidence using simple digital forensics tools.

FORENSICS ANALYSIS WITH FTK: A Case Study Scenario by Omar Al Ibrahim and Majid Malaika

Digital forensics is the process of recovering, preserving, and examining digital evidence in a way admissible in a court of law. This process is very delicate and requires deep understanding of both legal and technical aspects which includes knowing the right procedures and tools to conduct forensics analysis. In this expository article, we walk through the steps of the forensics process using FTK. We elaborate on these steps using a case study of a hypothetical scenario.

INTERVIEW OF CYBER LAWYER Fernando M. Pinguello by Joanna Kretowicz

Class actions are one of the hot button cyber issues of the day – or at least the one that seems to grab the headlines. For example, around the time of the Facebook IPO, a class action lawsuit involving Facebook’s improper use of users’ personal data for advertisement purposes dominated the headlines, and was a contributing factor to Facebook’s sluggish stock price.

MEMORY ANALYSIS USING DUMPIT AND VOLATILITY by Daniel Dieterle

Want an easy way to grab a memory dump from a live system and search it for forensic artifacts? Look no further than DumpIt and Volatility. In this article we will see how to pull pertinent information from a memory dump and cover some basic analysis with Volatility. We will also look at a memory image infected with Stuxnet.

A PRACTICAL APPROACH TO MALWARE MEMORY FORENSICS by Monnappa K A

Memory Forensics is the analysis of the memory image taken from the running computer. It plays an important role in investigations and incident response. In this article, we will learn how to use Memory Forensic Toolkits such as Volatility to analyze the memory artifacts with practical real life forensics scenarios.

STEP BY STEP ANALYSIS OF FACEBOOK AND TWITTER DATA ON ANDROID DEVICES by Massimo Barone

The growth of social networks is heavily influenced by the burgeoning numbers of smartphones which allow access to these platforms at any time and from any place. A recent study published by Mashable shows that across all the social networking platforms, including Facebook and Google+, it is Twitter that holds the crown for the fastest growing number of active users.

POTENTIAL IDENTITY THEFT OVER APPLE’S iOS DEVICES by Shaikh Javed Hasan Nisar Ahmed

In our day to day life cycle, the demand of mobile phone increased immensely with boundless number of applications and services. The success of Apple’s corporation evidently shows the growing popularity of new generation wireless computing. Hence as the mobile computing had become the part of everyday life of billions of people all around the world, and thus matter of fact, mobile platform is also the biggest target of new generation cyber crimes.

TALKING ABOUT TECHNO LAW – INTERVIEW WITH BENJAMIN WRIGHT by Vaman Amarjeet

Successful Practices for Bring Your Own Device (BYOD), Data Protection and Your Organization. Interview: Elizabeth Rogers

LET’S TALK ABOUT SECURITY – interviews with ‘Network Security” speakers

As a proud Official Media Partner of Network Security we would like to draw your attention to this must attend event for anyone working in security and present you interviews with some of the speakers.


Download
File
eForensics_Open_02_2013.pdf
eForensics_Open_02_2013.epub

July 30, 2021
Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023